A method has be discovered to prevent the current variations of Petya (Not Petya) that broke out in Eastern Europe yesterday from infecting systems that are still not patched. This article at BleepingComputer describes how you can create three files in the Windows folder and set them to Read Only, preventing Petya from activating. This is in no way green light to not patch the vulnerability described in MS17-010, but simply an extra layer of protection for this one particular varient. Patching… just do it!
I’ve written and linked below a ConnectWise Automate script that will automate the process of creating these files and setting read only permissions across your client base.
Automate Script: Petya (Not Petya) Vaccine.xml